Microsoft's Internet Explorer 8, not Apple's Safari, will be the first browser to fall in next week's Pwn2Own hacking challenge, the contest organizer said today.

Aaron Portnoy, security research team lead with 3Com TippingPoint, the sponsor of Pwn2Own, also predicted that Apple 's iPhone will be the only smartphone hacked during the contest, which starts March 24.

Portnoy, who organized the fourth annual Pwn2Own, changed his predictions from earlier bets he made a month ago because of new information he received from researchers who have registered for the contest. Previously, Portnoy said that Apple's browser would crumble before rivals from Google , Microsoft and Mozilla; he had also declined to speculate on which mobile phone, if any, would collapse under attack.

Researchers will compete for $100,000 in cash prizes next week at CanSecWest, the Vancouver, British Columbia, security conference that has been the home of Pwn2Own. The dual-track contest -- one for browsers, the other for mobile operating systems -- will pit hackers against the latest versions of Chrome, Firefox, Internet Explorer (IE) and Safari running on Windows 7 or Mac OS X. The smartphone track will set hackers against Apple's iPhone 3GS, a Blackberry Bold 9700, a Nokia phone running the Symbian S60 platform and a Motorola, most likely a Droid, powered by Google's Android.

"I have discovered that one of our very own ZDI researchers is armed and ready to take on [IE8] on the very first day," said Portnoy in an e-mailed explanation of why he changed his browser prediction. "This will indeed be an impressive exploit from a technical standpoint."

ZDI, for Zero Day Initiative, is TippingPoint's bug bounty program, which purchases the vulnerabilities and exploits used during Pwn2Own. ZDI reports the vulnerabilities to the appropriate vendors during the contest, but keeps technical details secret until the bugs are patched.

In a post to the TippingPoint blog Tuesday, Portnoy said that attempts to hack IE8 would be especially difficult because of Windows 7 security mechanisms such as DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization). TippingPoint has also barred researchers from exploiting third-party plug-ins the first day of the three-day contest, making it tougher to carry out a successful attack.

"I have seen the prowess of the researcher in question and I have no doubt they will be able to pull off a DEP- and ASLR-bypassing exploit on Day 1," said Portnoy about the impending IE8 attack.

Safari will fall the second day, Portnoy said; last month, he had put his money on Safari to drop first, in part because he said Mac OS X 10.6, aka Snow Leopard , wasn't "on the same level as Windows 7" when it came to security. "I believe that Safari will indeed go down, just not on Day 1," Portnoy said today.

Google's Chrome will be the only browser to survive all three days of Pwn2Own, he continued, citing Chrome's "sandbox" security feature that separates application processes from other applications, the operating system and user data. Other researchers, including past Pwn2Own winner Dino Dai Zov , have tapped Chrome's sandboxing as the browser security standard to beat.

Portnoy also changed his mind about the smartphone track in the last 30 days. "Now that we have received some early registrations for the contest, I was made aware of a competitor's interest in attacking the iPhone, likely on the first day of the contest," he said.

The other three smartphones -- the BlackBerry, the Nokia, and the Android-based handset -- will come out unscathed.

Whether his bets pay off or not, Portnoy is looking forward to the contest. Calling the hackers who have pre-registered "some of the best and brightest minds in security research," he said the exploits would be not just "very interesting," but would also demonstrate the current state of security in browsers and mobile operating systems.

There's more riding on Pwn2Own than the cash. Reputations are made at the contest; last year, for example, researcher Charlie Miller made headlines when he broke into a Mac in less than five seconds to win $5,000.

The contest is also important to vendors. Apple, which has watched Miller break into a Mac twice in the last two years -- Miller will be at Pwn2Own again trying for a "three-peat" -- patched 16 vulnerabilities , 12 of them critical, in Safari, possibly as a preemptive measure before the contest.

Late last week, Miller said that Apple had not patched all the vulnerabilities he knew about.

Portnoy promised to provide updates on each day's results during Pwn2Own on TippingPoint's DVLabs blog , and instant news nuggets on the company's Twitter feed . Computerworld will also be covering the contest.

Slideshows

ARN Exchange: Channel discusses security spending priorities

Customers spending priorities, drawing up a security strategy for customers and partners, detailing how partners can increase profit through security and outlining key areas of market growth ahead were some of the topics discussed at the ARN Exchange event in Sydney. Partners got together to talk about the spending priorities of customers within the security market today and the skills required from partners to deliver those services. The event was in association with Juniper Networks, Webroot, Cloud Plus and Mimecast. Photos by Christine Wong.

What are the spending priorities of customers within the security market today and what are the skills required from partners to deliver those services? An overview of the security market in Australia was debated in the ARN Exchange event in Melbourne with discussions covering the customers spending priorities, drawing up a security strategy for customers and partners, detailing how partners can increase profit through security and outlining key areas of market growth ahead. The event was in association with Juniper Networks, Webroot, Cloud Plus and Mimecast. Photos by Raymond Korn.

The channel came together for the forth running of the ARN Emerging Leaders Forum in Australia, created to provide a program that identifies, educates and showcases the upcoming talent of the ICT industry.
Hosted as a half day forum, attendees heard from industry specialists as keynoters and panellists discussed leadership paths and career choices. Hall of Fame members and industry mentors​ hosted small groups of future leaders to mentor and advise.
This also marked ARN's inaugural 30 Under 30 Tech Awards, which recognised young talent in the Australian IT industry across technical, sales, marketing, management, human resources and entrepreneur categories.
Photos by Christine Wong.

Copyright 2019 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.